Encrypted data storage system based on key other-place storage and method

A storage system and technology for encrypting data, applied in the fields of information transmission and storage and information security, can solve the problems of safe separation of encryption keys and ciphertext data, and achieve unconditional security, low power consumption, and reduced data security protection costs. Effect

Active Publication Date: 2019-04-02
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide an encrypted data storage system and method based on remote storage of keys for the above-mentioned deficiencies in the prior art. Unable to solve the problem of how to securely separate and store the encryption key and ciphertext data, the present invention can solve the problem of key security in the process of structured and unstructured data storage, database storage, data backup, cloud storage and cloud computing Storage and ciphertext data encryption and decryption storage problems, because the amount of encrypted keys can be many times smaller than the stored data, storing and managing the key store (key storage device) in different places is much less difficult than strictly managing data, so it can be effectively solved Security issues in the storage and computing process of various structured and unstructured data storage and databases, cloud storage and cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data storage system based on key other-place storage and method
  • Encrypted data storage system based on key other-place storage and method
  • Encrypted data storage system based on key other-place storage and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Example 1: see figure 2 , figure 2 It only shows the basic structure of key remote storage system 2 and data encryption and decryption storage system 3 in the application of database system, that is, it shows the basic security principles of establishing database encrypted storage and access, and database security backup, and completes the key-based remote storage The combination of the encrypted data storage system and various security control devices in the database system improves the security of the data. The specific structure is as follows.

[0097] The encrypted data storage system based on remote storage of keys is in the database application system. The database application system refers to the structured database application system, or the unstructured database application system, or the cloud storage application system. The entire system structure includes the control center, encryption key remote storage system 2, data encryption and decryption storage sy...

Embodiment 2

[0101] Example 2: see image 3 , image 3 It only shows the basic structure and principle of the encrypted data storage system based on remote key storage in database active-active application, and completes the combination of the encrypted data storage system based on remote key storage and the encryption device of the database active-active system, which greatly improves the database security. The security of the active-active system also improves the high reliability guarantee of the active-active database application. The specific structure is as follows.

[0102] The database active-active system of the encrypted data storage system based on the remote storage of keys, wherein the database application system can be a structured database application system, or an unstructured database application system, or an active-active or multi-active database system of a cloud storage application system , the system structure includes a control center, a remote storage system 2 for ...

Embodiment 3

[0105] Embodiment 3: see Figure 4 , Figure 4 It only illustrates the basic structure and principle of the application of the dual-key remote storage system 2 based on the encrypted data storage system stored in different places, which realizes multiple remote storage of keys and improves the efficiency and security of key storage. The dual-key off-site storage system 2 includes a key control center 1, a data security storage system 15, a first key off-site storage system 25, and a second key off-site storage system 26; the data security storage system 15 includes a data encryption and decryption storage system 3;

[0106] The key control center 1 controls the data encryption and decryption storage system 3, the first key remote storage system 25 and the second key remote storage system 26 to work, and the specific encryption method and decryption method are the same as figure 1 The encryption method and decryption method in the structure are basically the same, the differe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted data storage system based on key other-place storage and method. The encrypted data storage system based on key other-place storage comprises a key control center,a key other-place storage system and a data encryption and decryption storage system, wherein the key other-place storage system comprises a first key control device, a key storage device and a firstquantum key distribution device; the data encryption and decryption storage system comprises a second key control device, a data encryption and decryption storage device and a second quantum key distribution device; the first quantum key distribution device and the second quantum key distribution device are in quantum communication connection; the first key control device is in communication connection with the key storage device and the first quantum key distribution device respectively; and the second key control device is in communication connection with the data encryption and decryptionstorage device and the second quantum key distribution device respectively. The key other-place storage system and the data encryption and decryption storage system can be separated at any distance safely and reliably, and other-place separate and safe storage between encryption and decryption keys and data can be realized.

Description

technical field [0001] The invention relates to the fields of information transmission and storage and information security, in particular to an encrypted data storage system and method based on key remote storage. Background technique [0002] Information is an important strategic resource for social development, and all levels from national security to personal privacy protection are all related to information security. Among them, under the impetus of digital technology, the conversion of information into data for storage and flow transmission are two crucial links in the process of information circulation and use. In these two links, information data is at risk of being eavesdropped and stolen. Therefore, how to protect information and data security is an eternally important topic. [0003] In the field of data storage, with the accumulation of current data volume and the substantial expansion of data applications, in addition to personal computers, servers and storage ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0819H04L9/0852H04L63/062H04L67/1097H04L9/0894H04L9/0822G06F21/602G06F21/6218H04L63/0428G06F11/1451G06F11/1464G06F11/1469G06F21/78
Inventor 韩正甫王剑锋苗春华尹凯刘婧婧刘云
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products